A recent study conducted by Massachusetts-based cloud-native security firm Aqua has shed light on a concerning vulnerability present in millions of software repositories hosted on GitHub. This vulnerability, dubbed RepoJacking, poses a significant threat to repositories belonging to esteemed organizations…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Linux Malware GTPDOOR Exploits GPRS Roaming Networks to Target Telecom Companies
Security analysts have uncovered a fresh Linux malware named GTPDOOR, intended for deployment within telecom networks adjacent to GPRS roaming exchanges (GRX). What distinguishes this malware is its utilization of the GPRS Tunnelling Protocol (GTP) for commanding and controlling…
WordPress and Tumblr Intends to Sell User Content to AI Firms
Automattic, the parent company of websites like WordPress and Tumblr, is in negotiations to sell training-related content from its platforms to AI firms like MidJourney and OpenAI. Additionally, Automattic is trying to reassure users that they can opt-out at…
The “Mother of All Breaches”: Implications for Businesses
In the vast digital landscape, data breaches have become an unfortunate reality. However, some breaches stand out as monumental, and the recent discovery of the “mother of all breaches” (MOAB) is one such instance. Let’s delve into the details of…
Savvy Seahorse: The DNS-based Traffic Distribution System Undermining Cybersecurity
In the vast landscape of cyber threats, a new player named Savvy Seahorse has emerged, showcasing a distinctive modus operandi that sets it apart from its counterparts. While the investment scam it orchestrates is unfortunately commonplace, it’s the intricate…
Epic Games Faces Alleged Ransomware Attack
Recently, Epic Games, the renowned publisher of Fortnite, is reportedly under threat from a hacking group named Mogilevich. However, the legitimacy of this ransomware attack is yet to be confirmed. Epic Games has stated that they are actively investigating…
Hugging Face ML Models Compromised with Silent Backdoors Aimed at Data Scientists
As research from security firm JFrog revealed on Thursday in a report that is a likely harbinger of what’s to come, code uploaded to AI developer platform Hugging Face concealed the installation of backdoors and other forms of malware…
Old Website Tool Exploited by Hackers, Puts Education and Government Sites at Risk
Hackers are taking advantage of an old CMS editing tool for websites that have not been updated in a long time. They are using it to break into educational and government websites all over the world. Their goal is to…
This Chinese PC Manufacturer Tailored its Own Devices to be Susceptible to Malware
Acemagic, a Chinese manufacturer of personal computers, has acknowledged that certain products were shipped with pre-installed malware. The discovery was made by a YouTuber known as The Net Guy, who encountered malware on Acemagic mini PCs during testing in…
eBay, VMware, and McAfee Taken Down in Widespread Phishing Operation
Hackers have taken control of over 8,000 subdomains belonging to reputable companies and organizations to launch a massive phishing campaign that sends millions of malicious emails every day. Among the companies involved in “SubdoMailing” are MSN, VMware, McAfee, The Economist,…